Results: RFID and Identity Management in everyday life - ITAS
Results: RFID and Identity Management in everyday life - ITAS
Results: RFID and Identity Management in everyday life - ITAS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Case ID # 29, level 1<br />
Title AMC<br />
Researcher Christian van ’t Hof <strong>and</strong> Jesica Cornelissen<br />
Tim<strong>in</strong>g 2006<br />
Geography Amsterdam, the Netherl<strong>and</strong>s<br />
Environment hospital<br />
Technology Passive <strong>RFID</strong> tags, PDAs<br />
Maturity pilot<br />
Function Match<strong>in</strong>g patients to bloodbags<br />
Owner AMC<br />
Ma<strong>in</strong>ta<strong>in</strong>er AMC<br />
Users patients<br />
Other actors Docters <strong>and</strong> nurces<br />
Case #29: AMC hospital<br />
Case story This is a trial with three <strong>RFID</strong> applications: track<strong>in</strong>g medical personnel, patients <strong>and</strong> objects<br />
(bloodbags, <strong>in</strong>struments). When a patient arrives at the hospital he or she receives an <strong>RFID</strong><br />
bracelet. This bracelet makes it possible for hospital staff to identify the patient <strong>and</strong> to access<br />
medical records quickly <strong>and</strong> apply treatment with more accuracy. Also, blood bags are tagged by<br />
the hospital. All patient records <strong>and</strong> blood supply <strong>in</strong>formation are held on a secured database,<br />
which can be accessed by medical personnel through a PDA. Medical records are constantly<br />
updated, based on the read<strong>in</strong>g of the PDA’s.<br />
ID issue Besides match<strong>in</strong>g <strong>and</strong> error prevention of blood transfusion materials, <strong>in</strong>dividuals work<strong>in</strong>g <strong>in</strong> the<br />
operation rooms (OR) are identified <strong>and</strong> localised, as well as OR-materials.<br />
Sources 1. ‘Zorgsector start proef met <strong>RFID</strong>.’ (http://www.rfidnederl<strong>and</strong>.nl/Default2.aspx?tabid=264,<br />
visited 13 september 2006)<br />
2. Garf<strong>in</strong>kel, S. & Rosenberg, B. (ed.) (2006) <strong>RFID</strong>: Applications, Security <strong>and</strong> Privacy.<br />
Addison-Wesley.<br />
53